نتایج جستجو برای: security level
تعداد نتایج: 1235388 فیلتر نتایج به سال:
The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra ...
Background and purpose: Iran is one of the top ten countries in the world with disaster. Hospitals have a major role in dealing with disaster-related injuries. The purpose of this study was to assess the level of preparedness in Mazandaran province hospitals in dealing with disasters in order to identify the deficiencies and comparing current conditions with national standards. Materials and m...
In order to obtain evidence of the security and privacy issues of products, services or an organization, systematic approaches to measuring security are needed. In this study we survey the emerging security metrics approaches from the academic, governmental and industrial perspectives. We aim to bridge the gaps between business management, information security management and ICT product securit...
In recent years, tenure security has been one of the main objectives of improvement projects in urban poor settlements. Despite lots of international studies initiated in this field, it has received little attention in Iran. The main aim of this paper is to assess the influence of tenure security on the level of household investment in housing. Survey method is considered as the methodology ...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s behavior, generating attack graph and calculating different security metrics. The graph represents all possible attack scenarios taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The security metrics describe computer network security a...
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. ...
Wireless sensor network is one of the fundamental components of the Internet of Things. With the growing use of wireless sensor networks in commercial and military, data security is a critical problem in these applications. Considerable security works have been studied. However, the majority of these works based on the scenarios that the sensitivities of data in the networks are in the same. In...
Research has shown that multiple factors affect the implementation of effective information security in general medical practices. These relate to trust, capability, costs, time, knowledge level, poor implementation, attitude and inconsistencies in objectives. This paper discusses these issues, their affect on medical information security practice and their solutions as part of an information s...
The markets in which organizations currently operate require them to use behaviour based on both exploitation strategy and exploration strategy, each of which contributes fundamental benefits for the firm’s success. Exploitation strategy attempts to obtain the maximum advantage from existing abilities, whereas exploration strategy searches for new ways for the organization to adapt. Further, si...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید